mirror of
https://github.com/zitadel/zitadel.git
synced 2024-12-12 11:04:25 +00:00
b9c938594c
* policy added * Make it executable * Make it executable, corrections * password age policy added * password lockout policy added * corrections * policy added * Make it executable * Make it executable, corrections * password age policy added * password lockout policy added * corrections * fix(repository): remove second policy * complaints corrected * Init tests * add some tests * more tests added * systemfefaults added * default values load added * check for default value added * fixes * fixed * create policy if not exists * eventstore tests added Co-authored-by: adlerhurst <silvan.reusser@gmail.com>
81 lines
2.3 KiB
Go
81 lines
2.3 KiB
Go
package eventsourcing
|
|
|
|
import (
|
|
"encoding/json"
|
|
|
|
"github.com/caos/logging"
|
|
"github.com/caos/zitadel/internal/eventstore/models"
|
|
es_models "github.com/caos/zitadel/internal/eventstore/models"
|
|
"github.com/caos/zitadel/internal/policy/model"
|
|
)
|
|
|
|
const (
|
|
policyLockoutVersion = "v1"
|
|
)
|
|
|
|
type PasswordLockoutPolicy struct {
|
|
models.ObjectRoot
|
|
|
|
Description string `json:"description,omitempty"`
|
|
State int32 `json:"-"`
|
|
MaxAttempts uint64 `json:"maxAttempts"`
|
|
ShowLockOutFailures bool `json:"showLockOutFailures"`
|
|
}
|
|
|
|
func (p *PasswordLockoutPolicy) LockoutChanges(changed *PasswordLockoutPolicy) map[string]interface{} {
|
|
changes := make(map[string]interface{}, 1)
|
|
if changed.Description != "" && p.Description != changed.Description {
|
|
changes["description"] = changed.Description
|
|
}
|
|
if p.MaxAttempts != changed.MaxAttempts {
|
|
changes["maxAttempts"] = changed.MaxAttempts
|
|
}
|
|
if p.ShowLockOutFailures != changed.ShowLockOutFailures {
|
|
changes["showLockOutFailures"] = changed.ShowLockOutFailures
|
|
}
|
|
return changes
|
|
}
|
|
|
|
func PasswordLockoutPolicyFromModel(policy *model.PasswordLockoutPolicy) *PasswordLockoutPolicy {
|
|
return &PasswordLockoutPolicy{
|
|
ObjectRoot: policy.ObjectRoot,
|
|
Description: policy.Description,
|
|
State: int32(policy.State),
|
|
MaxAttempts: policy.MaxAttempts,
|
|
ShowLockOutFailures: policy.ShowLockOutFailures,
|
|
}
|
|
}
|
|
|
|
func PasswordLockoutPolicyToModel(policy *PasswordLockoutPolicy) *model.PasswordLockoutPolicy {
|
|
return &model.PasswordLockoutPolicy{
|
|
ObjectRoot: policy.ObjectRoot,
|
|
Description: policy.Description,
|
|
State: model.PolicyState(policy.State),
|
|
MaxAttempts: policy.MaxAttempts,
|
|
ShowLockOutFailures: policy.ShowLockOutFailures,
|
|
}
|
|
}
|
|
|
|
func (p *PasswordLockoutPolicy) AppendEvents(events ...*es_models.Event) error {
|
|
for _, event := range events {
|
|
if err := p.AppendEvent(event); err != nil {
|
|
return err
|
|
}
|
|
}
|
|
return nil
|
|
}
|
|
|
|
func (p *PasswordLockoutPolicy) AppendEvent(event *es_models.Event) error {
|
|
p.ObjectRoot.AppendEvent(event)
|
|
|
|
switch event.Type {
|
|
case model.PasswordLockoutPolicyAdded, model.PasswordLockoutPolicyChanged:
|
|
if err := json.Unmarshal(event.Data, p); err != nil {
|
|
logging.Log("EVEN-idl93").WithError(err).Error("could not unmarshal event data")
|
|
return err
|
|
}
|
|
return nil
|
|
}
|
|
return nil
|
|
}
|